Program Manager: Driver’s Training Program

Start Date: 2008-07-01End Date: 2010-01-01

Responsibilities • Established operational procedures, lesson plans, teaching materials and resourced equipment in order to standardize organization’s driver’s training program • Embodied the Army Safety Program through implementing a strict risk management platform to ensure highest quality of training at lowest acceptable risk levels through identification of sources of safety liability, safety risk, and required safety records • During project execution, continually monitored effectiveness of program, updating documents and procedures as required based on constant consumer and stakeholder feedback Accomplishments Qualified over two hundred personnel in safe driving practices and saved the Army millions of dollars in lost revenue by preventing vehicle and personnel accidents

Project Manager: Signals Intelligence Mobile Training Team

Start Date: 2011-06-01End Date: 2012-05-01

Responsibilities • Implemented a mobile training team concept to advise senior level clients on maximizing their tactical intelligence assets’ effectiveness during combat operations • Recognized as a subject matter expert, routinely depended upon to liaise with government contractors and the Army Cryptologic Office to develop an improved program of instruction for in-theater certification • Refined reporting procedures, training materials and resources to better serve current operators, personally training ten individuals on the tactical and technical employment of their systems Accomplishments Standardized reporting, training and operational procedures to increase effectiveness in capturing enemy targets, leading to a significant rise in captures and detentions of high value targets and persons of interest throughout area of operations

Training Department Head. Implemented improved Prospective Information Warfare Commander (IWC) course and provided training to five Strike Group on current IO/IW Tactics Techniques and Procedures (TTPs) as well as providing relevant practical information through precedent setting Post Deployment IO lessons learned briefs which enhanced Commander's IO/IW knowledge and prepared them for deployment. Led a team of 17 CTTs responsible for training deploying Strike Groups in numerous Information Operation courses. To include Surface Electronic Warfare Tactics course (SEWTAC), Maritime Military Deception Team Training course (MMTTC), Navy Information Warfare Tactics and Operations course (NIWTOC) and Operations Security (OPSEC). These courses introduced the range of published Information Operations and Surface EW tactics necessary to plan and conduct Electronic Warfare support, counter-intelligence, surveillance, reconnaissance, emission control, Communications EW, and counter-targeting as well planning methodology described in multi-service TTP for military deception and navy military deception NTTP 3-58.2 and Operations Security, providing an introduction to OPSEC, threats, vulnerabilities, risks and indicators. His team regularly provided updates and revisions to these courses to ensure Strike Groups had the most current and up to date information.

• 12 years of all-source intelligence analyst experience (HUMIT, SIGINT, OSINT, IMINT) • Active TS/SCI clearance: August 2012 • Superior writing and communication skills • Wide-ranging experience at the tactical, operational and strategic levels • Knowledge of intelligence methods and operations • Experience with foreign military engagements • Excellent interpersonal and human relations skillsSenior Intelligence Analyst • Served as a Senior All-Source Intelligence Analyst for Afghanistan on targeting support to Village Stability Operations: geopolitical, military, insurgencies, and economic issues; North Korea on Maritime Counter-proliferation: geopolitical, military, and commercial shipping. • Reviewed, edited, planned, prepared, and published in-depth regional, strategic, and functional military intelligence studies and products. • Researched, reviewed, evaluated, analyzed, and integrated all-source intelligence data in order to assess and identify capabilities, vulnerabilities, opportunities, threats, and targets to develop warnings. • Effectively exploited, analyzed, and evaluated large volumes of intelligence materials of a highly specialized, particularly sensitive character which resulted in a greater awareness of foreign policies and events. • Managed approximately 20 personnel, developed collections strategies, yearly production and training plans, and provided mentorship and professional development for junior personnel. • Managed the building of over 200 intelligence briefs for senior military officers assisting in decision making on regional threats and events. • Shipboard Reconnaissance and Recognition Team (SNOOPIE Team) Lead, responsible for managing 12 personnel responsible for development of all surface/air contacts within visual range of the ship in support of threat indications and warning. Targeting Intelligence • Assisted Battle Group Targetteer with target development, nomination, execution, and review of numerous targets in support of initial OEF missions in 2001. • Fused collection asset management with targeting determination for a 30% reduction in Mission Report processing through timelier BDA/BHA in support of OEF operations in 2001 for Battle Group Commander. • Lead targeting analyst at CJSOTF-A in support of Target development/management for SOTF-S AO in support of VSO mission during OEF in 2013. • Produced user-friendly, detailed, target intelligence procedures handbook, RECCE Guides, and Divert Packets that assisted junior intelligence analysts and Pilots/Aircrew in understanding the misson. Security Management • Supervised and directed office personnel responsible for handling clearance related issues for 15,000 forward deployed US DoD military, contractor personnel, and Coalition military personnel, providing clearance verification determination allowing/denying access to US Embassy, Baghdad • Performed SCI level indoctrinations and debriefs; processed Visit Certification, Permanent Certification, and Transfer in Status messages for afore mentioned personnel. • Acted as preliminary investigator for all security violations originating or involving Multi-National Force – Iraq forward Headquarters or the US Embassy, Baghdad. • Responsible for the development of security policies and procedures, security training and awareness, and providing security incident assessments. • Collateral duties included Foreign Disclosure Officer and Classified Material Custodian for over $12 million worth of classified systems and equipment. Anti-terrorism/Force Protection • Coordinated with Regional Security Officers (RSO) and Embassy personnel on force protection issues in Baghdad as Special Security Chief to MNF-I HQ (FWD). • Prepared Anti-terrorism/Force Protection plans in support of hanger, squadron, base, and air wing security coordination plans at Whidbey Island Naval Air Station while attached to Electronic Attack Squadron 135. • Establish classified destruction plan for all squadron intelligence spaces in the event of base/hanger compromise. • Managed database of all cleared personnel as the Assistant Command Security Manager in order to support investigation of missing/unaccounted personnel and for recall of mission essential squadron force protection reaction forces. • Conducted Indications and Warnings analysis of threat reporting involving counter-terrorism providing fleet and theater intelligence centers with actionable maritime intelligence and providing coordination between USN and pertinent IC agencies. • Routinely briefed Director of Naval Intelligence (DNI) and Senior ONI leadership on emerging maritime counter-terrorism intelligence issues. Responsible for managing PACOM/SOUTHCOM Team tasking, scheduling, and mentoring the performance of junior military personnel assigned to the team. Cyber Intelligence • Department of the Navy (DoN), Damage Assessment Management Office (DAMO) Cyber Intelligence analyst, worked with a team to provide analysis, estimates, and assessments in support of the DAMO mission. • Assessed the damage caused by the exfiltration of critical program information from cleared defense contractor (CDC) systems by foreign computer network attack (CNA) groups • Coordinated with OSD and other service DAMOs to facilitate review of compromised data for DoN cases. Worked with NCIS, FBI, DSS, and other LE/CI and IC organizations to determine threat to CDC systems based on adversarial Computer Network Operations (CNO).

Several years of experience as a Police Officer/Investigator working with youth, citizens and governmental agencies. Many years of private and retail security. Ten plus (10+) years of experience in Labor Relations for State peace officer/public employee labor organizations and a Personnel Manager for a public employer. Experience as a regulator/gaming investigator for a Tribal Gaming Commission at Thunder Valley Casino. Skills * Investigative report writing * Investigative techniques * Computer savvy * Can work independently * Ability to deal with all types of people * Self driven

Police Officer

Start Date: 1969-05-01End Date: 1974-05-01

California Responded to calls for service regarding accidents, emergencies, crimes, threats, altercations and/or requests for aid. Provided information and assistance to the public and promoted good public relations. Administered first aid to injured persons. Interviewed, interrogated and recorded statements from witnesses, suspects and victims. Identified relevant facts and prepared written reports on incidents and cases assigned. Apprehended suspects by driving safely at high speeds, chasing suspects on foot, climbing over obstacles, physically subduing suspects and utilizing self-defense techniques. Enforced traffic laws, directed traffic, issued citations and warnings. Investigated accidents and accident scenes. Investigated matters involving juveniles, reports of child neglect and juvenile delinquency. Referred juveniles to the appropriate authorities. Served subpoenas, serves warrants, testified in court, marked and stored evidence, apprehended suspects, made arrests as prescribed by law, and conferred with City/District Attorney's Office to provide information for case preparation. Assumed personal responsibility for ensuring the duties of the position are performed in a safe, efficient manner. Performed other related duties as assigned or as the situation requires.

Lead Engineer - Booz Allen Hamilton

Timestamp: 2015-12-24

A highly skilled IT systems engineer and business process improvement consultant offering 13 years of combined business practices and academic experience within the private and public sectors, such as DoD, DIA, DHS, Dos, IC. He is experienced in the full range of client facing business and information technology solutions including: systems development and requirements, application design, creating efficiencies through process improvement, cost-benefit analysis, financial management, strategic planning, business transformation and development, systems testing, communications, change management, and project management. Bryan is particularly passionate about building enterprise and shared service solutions to create economies of scale and realize cost savings. Bryan is focused on leveraging his experience to deliver successful end-to-end solutions to clients.

Auditor

Start Date: 2010-06-01End Date: 2011-03-01

Provided direct support to the Office of the Inspector General o Conducted both internal and external performance audits by collecting, analyzing, and disseminating information based on Federal audit standards governing the scope, methodology, and conclusion of final products o Analyzed financial records of high-level Special Access Programs for adherence to official guidance and ethical practices, and reviewed specific expenditures by devising a methodological process for accurate analysis o Wrote numerous papers, memoranda, and correspondence by organizing, reviewing, writing, and editing based on government standards o Researched relevant criteria for performance audit by critically evaluating federal laws, regulations, contracts, internal controls, grant agreements, standards, measures, expectations, defined practices, and benchmarks against which performance was compared or evaluated o Conducted interviews of civilian and military personnel by traveling locally and going on TDY to various locations around the country o Displayed critical analysis of subject matter by writing objective work papers that supported major projects to be presented to the Inspector General and Director, DIA o Tested software (Entellitrak) for agency-wide use by organizing work-flow, documenting errors, meeting with developers to recalibrate and adjust capabilities for agency needs o Engineered off-site network for audit teams use during external audit, and served as IT troubleshooter to maintain systems in cleared environment • Provided direct support at DIA, Joint Forces Command as an Analyst/Writer o Performed all-source analysis for Joint Personnel Recovery Missions by researching collected intelligence on geography, geo-politics, military capabilities, and environments, then packaged products for dissemination to senior management and military decision makers o Identified risks, threats, and opportunities from open-source media associated with mission objectives and presented findings to management and team o Wrote final reports for delivery to customers (Combatant Commands) by following DIA analytical writing standards and corroborating with project team members

BTA-(ServiceNow, Planview, Verant, ICD 10 and Facets) - Define business aligned end-to-end IT services (or service modules) and map current end user service requests to defined services. Identify the services and end user service requests and identify the sequence for automation. Critically evaluate information gathered from multiple sources, reconcile conflicts, decompose high-level information into details, abstract up from low-level information to a general understanding, and distinguish user requests from the underlying true needs. Create BRD(s) based on fact finding, investigations and business process modeling.

VA-Verify DES encryption, Digital Certificates, SSL, development of DMZ's and other security tools and processes such as eTrust Access Control. Configurations for each server had to be verified and authentication and access control had to be robust. Per ITIL v3, change management, service and configuration management, release and deployment, service, change and knowledge base were integral components or tools. All updates went through the Change Control Board (CCB) by Change Orders being required to log all pertinent system updates. For issues where the risk was accepted, Risk Acceptance Documents (RAD)/Risk Based Decision (RBD) were drafted and had to be approved by the Business Owner. Factory and User Acceptance Testing, regression testing, smoke test, SIT test as well as modifications and changes prior to deployment and release.

Senior Information Assurance Analyst

Start Date: 2011-11-01End Date: 2013-08-01

Develops and updates C&A security artifacts such as security plans, contingency plans, risk assessments, privacy impact assessments, incident response plans, configuration management plans, configurations checklists, and interconnection security agreements. Including continuous monitoring, self-assessment testing, and audit and compliance support. Conducts audits on artifacts to ensure they meet all applicable FISMA, NIST, VA, and CDCO criteria, including obtaining management approval. • Continuing to draft and implement the following initiatives and supporting documentation for the VA during my tenure: o Business Impact Analysis (BIA) o Risk Analysis (RA) o Mitigation strategy creation o Business Continuity Disaster Recovery Plan (BCDRP) o Facilitated functional and tabletop test o Facilitated scrum sessions during exercise • Researches information through documentation review, interview, and the use of automated tools such as the Configuration Management Database. Continually monitors specific change orders for information that can be used to update documentation through the use of tools such as CA Unicenter. Perform a risk assessment on an application according to NIST SP 800-30. Assesses security controls for annual FISMA self-assessment testing through interview, documentation review, analyzing scan results, and reviewing other audits/reviews for applicable findings, Maintains a high-level of knowledge on related criteria and guidance such as FISMA, NIST Special Pubs, OMB Memorandum, Privacy Act, HIPAA, VA directives and handbooks, and local directives and handbooks. • Provides information assurance policy guidance to both internal and external customers. Acts as interface with customer to provide audit support for both internal and external audits and reviews. Meets with task order Contracting Officer's Technical Representative (COTR) and/or Project Manager on a bi-monthly basis to discuss status of work. Meets with Contracting Officer and PM on an as-needed basis to discuss problems and concerns, status of work, changes in assignments or other contract related issues. Accreditation for Enterprise Management Framework (EMF). • Provide occasional, assistance with the development and maintenance of internal Red Team methodology, to include training program. • The area that required my attention the most was the technical controls. These were specific to the application and included but not limited to the platform, hardware, software, network, firewall, and connectivity • The documentation on each server or mainframe unit consisted of its physical components including serial numbers, vender ID numbers, operating system, description, platform, function and demographic location within the DC. All of these factors make up the system's schematic and accreditation boundary • Assessment and Authorization (A&A) formerly C&A on COTS/GOTS systems that are Linux, Mainframe, Windows as well as UNIX platforms. This included artifacts as well as continuity of operations plan (COOP), service level agreements/memo of understandings (SLA/MOU) to name a few • GRC tool of XACTA was used in conjunction with SharePoint to support Enterprise Operations (EO) • Facilitate requirement elicitation and validation with the business, IT, PMO and third party vendors as needed including but not limited to The Harris Corporation, SunGard, and Iron Mountain as applicable • Adherence to NIST and HIPAA guidelines on matters pertaining to confidentiality, data integrity and availability. • Interpret Retina, Nessus and Gold Disk Scan results based on the IP address summary, dynamic vs. real-time scans, active and passive vulnerability scans, New IP addresses and open ports analysis as well as monitoring mobile devises • Make sure the customer is kept abreast and that AITC was aware of what is/was expected. I also work closely with the information system owners (ISO), privacy officer (PO), project managers (PM), as well as the system owner (SO) to name a few. In many cases I use various fact finding methods to get information from SME(s), system administrators as well as DBA(s) • Schedule activities for the development of security test plans, conduct security testing, analyze test results, and develop risk assessment reports that document vulnerabilities, threats, impacts, and recommended mitigations • Systematically evaluate, describe, test and authorize systems prior to or after a system is in operation • Analysis is based on NIST standards ( 800-53, 800-60, 800-37) FISMA, and stored in the SMART and put XACTA

Senior Certification and Accreditation Analyst/Project Manager-G-12

Start Date: 2011-01-01End Date: 2011-08-01

I was the Disaster Recovery oversight for the mainframe migration moving from the Department of Justice in Dallas to the move to DHS at Stennis Space Center • Worked closely with DoD personnel to assure the datacenter was also DIACAP compliant. That used Host Based Security System (HBSS) within our joint datacenter. • Use MS Project and SharePoint to put the Certification and Accreditation packages in the form of a nine part project with the artifacts being milestones and benchmarks • Implement information system security practices to critical systems and applications. The ATO and ATC were pivotal in the mainframe migration from DOJ to DHS. This was extremely time sensitive • Provide data to the USDA and DHS for the Certification and Accreditation Process to receive an authority to operate and authority to connect (ATO/ATC). Provide input to leadership on improvements and recommendations • Perform multiple activities which focused on the development of security test plans, conduct security testing, analyze test results, and develop risk assessment reports that document vulnerabilities, threats, impacts, and recommended mitigations • Worked extensively with the Change Control Board (CCB) to assure the mainframe's migration was in accordance with DHS and NIST regulations which included but not limited to the System Security Plan, Security Features Users Guide, and the Privacy Impact Analysis • Charted and tracked milestones for the MF migration from Dallas to Stennis Space Center with the failover location in Virginia. All these systems and their dependencies were on 1 of three Logical Particians (LPARS) • Systematically evaluate, describe, test and authorize systems prior to or after a system is in operation. • The analysis is based on NIST standards (800-34, 800-53, 800-60, 800-37) FISMA, NIACAP, DIACAP and stored in the Trusted Agency FISMA (TAF) • Create Risk Assessments and Contingency Plans for Mainframe Applications. This includes documenting and testing the failover architecture, procedures and personnel. Components include the Hitachi Sans, zOS, interdependencies and end-user functionality • Established and implemented teleworking and remote procedures and parameters of approximately 30% • Document and verify the data replication via the Hitachi SANS utilizing the data mirroring and shadowing. Also made sure it was in compliance and functioning through testing • Establishes team membership and negotiates time commitments and resource allocation • Motivates team members and facilitates team meetings and acts as liaison, problem solver, and facilitator • Make sure proper documentation is in place which includes but is not limited to SLA(s), MOU, ATO, RTA, COC • Perform comprehensive evaluation of the technical and non-technical security controls (safeguards) of an information system to support the accreditation process that establishes the extent to which a particular design and implementation meets a set of specified security requirement

Security-Intelligence Research Analyst

Start Date: 2004-02-01

Conduct research, investigate, prepare and present high-level briefings to CEO and key leadership for both peace-time and emergency situations (preventative and reactive measures). Produce situation estimates, academic studies, in conjunction with other informational reports and studies. Compile, segregate, evaluate research, interpret, analyze, and disseminate vital information. Use law enforcement and other informational automated database(s) to store, retrieve, display, and report pertinent information and establishes quality assurance requirements. • Serves as the risk/ incident analyst for the Illinois Joint Task Force (JTF); humanitarian relief efforts in response to man-made and/or natural disasters. • Prepare reports and conducts after-action debriefings of incidents involving personnel. • Maintain and use geospatial databases, full-motion video (FMV), and magery to conduct damage assessments for both man-made and natural disaster areas. • Key participant in several state-level tabletop and full-scale exercises for emergency response actions. • Independently assemble maps, charts, and objective area materials. • Assemble, produce, evaluate, and update prediction materials based on risk analysis of All-Source information. • Systems Program Manager that ensure daily management and Communication Security (COMSEC) compliance. • Provides analysis of the Open-Source and All-Source information, and translates in detail the analyses of overall information through presentations to the CEO and other key leadership. • Performed independent research, analysis and project management functions. • Performed vulnerability and risk assessments based on ASIS guidelines and standards. • Anti-Terrorism monitor/advisor in support of base safety and protection. • Expert in computer networking, hardware installation and modification, SharePoint development and design, configuration and troubleshooting. • Wrote and published Standard Operating Procedures (SOPs) Additional Duties Standardization & Evaluation Researched regulations, plans and procedures to identify training requirements. Developed effective lesson plans and training materials. Implemented training programs for both construction and operational personnel. Evaluated training programs for additional improvements. Provided continuing training in military operations intelligence. • Compile and reports trend analysis information for Standardization and Evaluation to CEO and key leadership. • Assist in identifying operational and/or training factors that positively or adversely affect operational capabilities and make specific recommendations for corrective actions as needed. • Create and file Memorandums for Record (MFRs) to document corrections, waivers, and extensions. • Provide expertise to 103 military units with more than 1,000 personnel on a wide variety of software. • Patriot Excalibur (PEX) software program assistant, responsible for ensuring implementation of a $16 million dollar program. • Expert in using Management Internal Control Tool (MICT) software. Provide coordination and input for formal Instructions, Policies, and Regulations. Air Force Training Instructor Integrated US and foreign operations with the training team, working effectively with the training staff. Generated enthusiasm for success for all staff by establishing and maintaining cooperative and productive relationships with all employees and external customers and clients, while ensuring all programs and tasks complied with applicable safety standards and laws, with safety statistics and monetary impacts from safety-related problems well below company and division limits. • Improved team performance by effectively using formal reviews based on objectives and informal coaching to motivate staff. • Coordinates with a staff of 25 instructors and subject matter experts (SMEs) for advanced strategic planning blocks of instruction. • Administers student measurement devices and analyzes test measurement results. • Guides, counsels and mentors students on professional/academic standards. • Prepares approximately 96 Active duty, Air National Guard and Air Force Reserves officer and enlisted professionals per year to deploy; interfaces with about 500 students annually from all branches of service, components, to include foreign countries. • Responsible for the physical security of communication systems and ensured only accredited software was loaded. Recruiter • Managed and supervised an average of 5 to 10 recruits monthly. • Interviewed prospective applicants, conduct reference checks, background checks through the local police department, initiated security clearance paperwork and placed them into the best possible position to match their experience. • Developed information sources such as high school and college students’ lists, and separation reports for securing names of potential prospects for enlistment and commissioning. • Documented history of boosting recruiting productivity metrics, along with demonstrating leadership and high level management qualities.

Linguist/Intelligence Analyst

Start Date: 2003-12-01End Date: 2011-12-01

Directed prosecution of a national Intelligence Surveillance and Reconnaissance (ISR) mission to ensure accuracy and timeliness of intelligence production, provided both language and indications and warning support to forward-deployed war fighters. • Worked as a lead operator and supervisor, reviewing and editing both transcriptions and translations to ensure quality control and accuracy. • Created, implemented, and managed a training program and training material that incorporated language skills and mission capabilities to ensure the success of all basic and experienced operators, ensuring 100% mission success. • Developed training material and worked as a DNI language analyst, provided language support and expertise to a developing mission. • Served as a subject matter and area expert and provided mission-related intelligence analysis and language support to high-level customers, tactical commanders, and deployed forces. • Analyzed mission-related information to determine importance and intelligence value. • Drafted thousands of time-sensitive reports that were received by both local and national level customers. • Briefed high-ranking military and civilian personnel on national targets, capabilities, threats, strategies, and Persian culture.

Network Architect

Start Date: 2011-07-01End Date: 2012-07-01

I developed policies and procedures for network equipment, system operation, and installation; conducted risk assessments for information systems that identified information assets, vulnerabilities, threats, and safety factors. I also analyzed deployable migration plans for implementation of new technologies such as Cisco wireless, routing protocols such as (BGP/OSPF/EIGRP), and network security IOS device hardening to prevent Cyber related attacks. I developed system administration standard operation procedures and provided guidance to management to include providing technical assistance to the user community during all phases of the standard lifecycle of assigned system; primary duties include researching, designing, implementing various projects to meet the customer needs and managing over 1,100+ remote locations throughout North in a large scale Enterprise infrastructure. I worked with multiple vendors (Sprint, Time Warner Cable, ComCast, and Verizon) for circuit installation and ISP peering Other duties include working with network performance vendors to include (Niksun, RiverBed, Opnet) for faultfinding, network optimizations, and network analysis. I served as the Senior technical expert for the following Cisco Switches: Nexus 7000, Nexus 5000, 6500 Series, 3560, 3550, 2960 and the following Cisco Routers: Cisco 2811, 2600, 871, 891, 7200 VXR Series as well as the Cisco ASA 5540, 5520 Series Firewalls; work extensively with Microsoft Visio, Microsoft Excel, and Putty, Secure CRT, Microsoft Project, and GNS3 network immolator for project design, testing, and troubleshooting. I prepared and presented clear and persuasive oral and written presentations regarding IT related policies and procedures for a wide range of audience. Other duties include supporting multiple projects during network migration, tasks arrange from being Project Lead to training junior personnel on network management and troubleshooting to being a team player to support the customer's requirements. I advised senior management within the organization on the adequacy of documentation and overall government IT compliance and facilitated communication among various entities within the IT department in matters relating to records/information assets and the management of risks to those assets; prepared and presented analytical information to senior management officials. I demonstrated best practice experience with security deployments, system integration, new and emerging technologies and IT governance processes; worked with senior management to develop the organization's primary mission goals and objectives.

COUNTERINSURGENCY AND HYBRID WARFARE CHIEF

Start Date: 2011-06-01End Date: 2013-06-01

GENERAL. Officer in Charge of Intelligence Support to Counterinsurgency and Hybrid Warfare Block of the Military Intelligence Captains’ Career Course (MICCC) at the US Army Intelligence Center of Excellence. Received distinguished honor of Senior Instructor. Responsible for managing, training, coaching, and mentoring over 600 US and Allied officers annually in the tasks required to succeed as military intelligence captains. Provided program oversight, policy development, planning, direction, program management, evaluation, and coordination. Served as Senior Faculty Advisor for MICCC classes. INSTRUCTION AND TRAINING. Analyzed, designed, developed, implemented, and evaluated training and curricula for block of instruction. Advised on and improved other MICCC programs. Ably trained, counseled, and mentored officers in the critical tasks, i.e. the Military Decision Making Process, Intelligence Cycle including ISR/information collection, required to succeed as tactical Battalion Intelligence Officers and Assistant Brigade Intelligence Officers. Developed intelligence training techniques and procedures. Set class schedules and directed all assignments. Conducted classroom instruction based on current Army and Joint doctrine and the application of tactics, techniques, and procedures in Intelligence Support. Coordinated Block training plans. Instructed several sessions at each course; team-taught and oversaw instruction of other portions. Rotated student officers through break-out squad sessions to provide spotlight lessons and other insights. Evaluated and refined practical exercises. Recommended program enhancements; developed and implemented changes to lessons and simulation exercises to ensure direct linkage to critical tasks, real world operations, and the contemporary operational environment. INTELLIGENCE ANALYSIS. Mastery of intelligence concepts, principles, and practices involved in developing training lessons and exercises. Continued to enhance analytical tradecraft and associated skills. Constantly evaluated current intelligence to enhance the program and reflect changing operational environments. Gathered data to optimize internal processes and procedures related to analytical tradecraft services. Produced assessments of real world operating environments supporting exercise planning and scenario development. Monitored retrieval, analysis, and development of assessments of facts, threats, human terrain, and implications of operational environment. Analyzed enemy tactics to simulate reality within exercises and lessons. Created analytical framework to enhance ability to know "when, where, why, and how" the enemy might attack. Studied the local populace in multiple geographic regions to better display human reactions within simulations. Reviewed intelligence data and threat assessment documents to evaluate effective integration into scenarios, and simulation modeling and development. Prepared finished products and took lead role on projects and partnerships jointly undertaken with other organizational units. High degree of analytical competence, judgment, resourcefulness, leadership, and creativity. INTELLIGENCE METHODOLOGY. Comprehensive knowledge and understanding of intelligence techniques and analytical tradecraft to support development of exercises, scenarios, and simulations. Ably made decisions in areas of uncertainty resulting from program changes and conflicting requirements. Developed new methods, approaches, and procedures to analyze and solve intelligence problems. Provided oversight, policy development, planning, direction, program management, evaluation, and coordination required to execute counterinsurgency and hybrid warfare training. RESOURCE MANAGEMENT. Adept at efficiently and effectively deploying organization’s resources. Managed Intelligence Support to Counterinsurgency and Hybrid Warfare Section, consisting of 2 US Army Captains and 3 civilian contractors. Section instructed and updated lessons to ensure a direct linkage to critical tasks, real world operations, and the contemporary operational environment. Drafted and reviewed MICCC documents relating to intelligence, including: policy, regulations, directives, concepts of operations, as well as tactics, techniques, and procedures, to ensure consistency with organizational philosophy. Extensive knowledge of resource management regulations, policies, and procedures – and applying skill to budget development. Applied expert judgment in interpreting information, providing recommendations, making decisions, and preparing management analysis and assessments, that impacted staffing policies and technology programs. SUPERVISION. Developed and incorporated changes required to meet workload demand, employee capabilities, and changes in manpower and funding authorizations. Prioritized work assignments to staff of 5 instructors, established performance standards, and evaluated performance to maximize efficiency and effectiveness for the organization. Organized, planned, directed, and coordinated staff projects. Reviewed work for content, and compliance with policies, regulations, and procedures. Provided input for promotions and award recommendations consistent with organizational policies, procedures, and directives. Scheduled and approved all continuing education for instructors. Utilized knowledge of personnel management regulations, policies, and procedures to apply skill in supervision. Arbitrated student/instructor issues. COMMUNICATIONS. Served as liaison to senior MICCC leadership. Provided subject matter advice to leadership, staff, and intelligence community on intelligence, operational environment and threat-related issues of impact to training program. Developed and maintained relationships to gain policy support. Prepared and presented briefings and represented MICCC activities in meetings and conferences. Developed and presented MICCC views on the new Counterinsurgency field manual currently in development. COLLABORATION. Served as a primary point of contact for MICCC Counterinsurgency and Hybrid Warfare programs. Worked with the MICCC Chief to coordinate activities internal and external to the Block. Participated in workgroups internal to the MICCC as well as external workgroups such as Doctrine and Learning Innovations (digital course development). KEY Accomplishments: - Conducted the analysis, then designed and supervised the outsourced development of a 3-D computer-generated simulation currently in use at the Intelligence Center. The 3-D Collection Asset Management System is an intelligence, surveillance, and reconnaissance (ISR) simulation which develops students’ ability to plan information collection activities and fuse intelligence. - During my tenure, senior officers' impressions and student evaluations were always of the highest ranking. - Conducted a strategic review of the course then developed material to lengthen one exercise while intensifying and improving the realism of all instruction. Raised the standards and expectations for briefing grades and tests. The enhanced grading rubric was used as a standard for other Blocks. The improvements were well-received by MICCC leadership and resulted in increased proficiency of students.

Senior Arabic Linguist - Chenega Corporation

Timestamp: 2015-12-26

Highly organized, active Top Secret cleared, multi-cultural professional with over 20 years' military and DoD contractor experience in Program & Project Management, Information Technology, Training Development, U.S. Intelligence Operations, foreign language and cryptologic training for the Air Force ISR Agency, Army INSCOM, and various U.S. government agencies. Seeking opportunities in project and program management.

Analyst

Timestamp: 2015-12-24

Management/Organization – Lead the team that won contract for OSM radar model production for SN family of radar models. As Program Manager and Chief Engineer executed 1.2 million $ prototype 6 month contract; resulted in award of modeling contract; wrote and negotiated 8.7 million contract. I developed a solid working relationship with the customers. Detail Oriented – Produced effective tools for forecasting and tracking, increased accuracy of contract BOE and detail of EVMS tracking. Reduced document error rate and increased clarity of technical documentation. Both led to increased customer satisfaction. Team Support – As part of my responsibility chief system engineer of DMST I saw an underutilized group of computer programmers and Radar SMEs that was about to be cut. I worked with them to create a solid proposal to Sensors directorate. By promoting collaboration and through constructive interaction with the team, we created a new business unit with a future. By creating positive working relationships with my teammates I am able to coordinate the team’s efforts into a cohesive product. Analysis – Performed analysis of GMD (Ground based midcourse Missile Defense) using a medium/high fidelity simulation in the areas of GMD Fire Control (GFC) behavior, threat representation, radar modeling & performance, statistical analysis of event timing & margin analysis. Analysis resulted in software problem reports and new requirements for the simulation, and two system anomaly reports resulting in recommended changes to the operational system. As Exercise Analysis lead I had extensive stakeholder and customer interaction to define objectives and instituted a new system engineering process to decompose engineering and operational objectives. Technical/Mechanical Skills –Managed full programming life cycle, led highly modularized software development team, moved to Agile as program constraints allowed. Learned structured programming and old code maintenance via on the job experience, modularized software and individual test programs for digital signal processing boards, maintained and improved various analysis scripts. Programming languages; limited proficiency or work experience (in order of recent use) Visual Basic, MatLab, C++, Java. Flexible/Adaptable – Adapted approach on radar modeling construct until SN was satisfied and awarded contract. Effectively managed the challenges of growth and cutbacks for various kinds of work groups. Innovation –Contributes to Missile Defense Integration Group Technical Working Group (MDIG TWG) a cross sector business development and technology exchange. My three year participation led to a cross sector capture teaming on a project worth 6B and assistance with the marketing of GATOR an NGES product, to MDA.Active Top Secret Security Clearence NGC Awards Timely Award $700-May 05 – GMDAL (GMD Missile Defense Analysis Lab) was given a special short-fuse task involving the modeling of the Long Range Air Launched Target using the LIDS simulation. This type of target had never been modeled in the LIDS simulation and that involved significant risk. Carrie Bell performed exceptionally in devising innovative methods to achieve a successful outcome of the analysis. Her work was a pathfinder for new uses of the LIDS simulation. Additionally, Carrie constructed a superb briefing presented to the System Test and Evaluation Lab in Huntsville AL. Her presentation was extremely well received and praised by the customer. Timely Award $800-April 06 Carrie Bell gathered extensive data and performed analysis resulting in an excellent presentation and briefing entitled, “A Utility Assessment of Forward Based Relocatable Sensors in the BMDS for Strategic Missile Defense” to the Missile Defense Conference in Washington DC, March 20-24, receiving positive customer feedback and high-level visibility. Timely Award $2000– Dec 07- Carrie played a large role in PA07; working the threats for the event. She worked consistency across all the simulations as well as GTI 02 additionally she worked the recovery effort for the V&V report Employee Appreciation Award $50– July 09- For outstanding work these last seven months as a critical asset to the team during the MDA Director’s Phase I, II and III Integrated Master Test Plan (IMTP) development effort. This award was in response to a letter from MDA/DE Keith Englander praising her performance: Ms. Bell’s professionalism, technical competence and dedication to mission accomplishment were critical during all phases of the effort. As a member of the Colorado Springs based M&S team who deployed to Huntsville, AL. Ms. Bell’s Digital Simulation Architecture, Communication Modeling and Threat Modeling expertise was instrumental in the team meeting incredibly short suspense for the MDA Director. She was often the requested choice as the resident expert to provide amplifying information to the test planning community. The dynamic nature of this activity required frequent and extensive night and weekend work and on repeated occasions a seven day work week. Ms. Bell is a valued asset and I appreciate the personal sacrifices made for this effort. Employee Evaluation Summary/Highlights 2003 System Eng 1 – Rating 4 FE (Far Exceeds expectations) Carrie has very quickly picked up tasks and has made significant contributions in the areas of threat modeling, GMD system issues and simulation problem reports. Supported Nimble Titan, IDO planning meetings, NATO and IMD 03-2 exercises. 2004 System Eng 2 – Rating 4 FE Contributed 100% award fee by promptly generating through analysis, briefings and contributing to key deliverable reports, comprehensive research and positive inter action with customers. Presents clear, well-organized presentations, in relevant terms; projects credibility and poise even in adversarial situations. Threat subject matter expert (SME) 2005 System Eng 3 – Rating 4 FE Coordinates well with customers (JNIC/SEAL, OTA, GMD Prime, GME-C/SET) to define test runs, threats, blue force laydowns (Architectures) and analysis products. Supported MDA DE Analysis Working Group and Scenario Working Group. Threat and GMD Fire Control SME 2006 System Eng 4 – Rating 3 EE (Exceeds Expectations) Carrie’s performance for GMDAL TRD has been outstanding this year. Her transition to the TMC (threat modeling ctr.) was quick and productive. She has become indispensible in high fidelity threat modeling, significantly exceeding short term expectations. Though not yet a designated supervisor, she has effectively mentored junior employees in her work area. 2007 System Eng 4 – Rating 4 FE Developed new threat V&V program that was praised by the OTA as considerably surpassing the established standard. Carrie’s help to the elements with integration and execution support for PA07 had high impact on the success of the event. She created an analysis utility that required considerable inter-element cooperation and data analysis that was used by PA analysis teams – OTA, CAAF and the elements. Carrie received outstanding praise from the Government Customer for that support. 2008 System Eng 5 – Rating 4 FE As Chief Systems Engineer, reorganized the work flow and process structure to better define work areas, increase management control in requirements process and improve interaction between system engineers and customers in the area of requirements acquisition. Demonstrates community leadership in implementing DES plans to transition to framework based M&S. Drove effort to execute European Capability War Game 2008 in 90 days. Currently developing innovative solutions to engineer a complex integration of DESIM, DSA and element models for ECWG09, Carrie exhibits great skill in negotiating solutions between War Fighter needs and technical/schedule constraints. Leads organizations efforts to acquire contract with SN to provide real time radar models; changing DES/MDA strategy requires constant customer contact to provide system engineering support to SN as they take on vastly increased responsibility to provide radar models to service all MDA M&S use cases. This capture activity is strategically key to M&S success and Carrie has done a superb job gaining the confidence of all relevant stakeholders. 2009 Mgr Systems Engineering 2– Rating 4 FE OSM PM Carrie has the unique ability to help the customer understand future direction and growth opportunities that are beneficial to the customer and the JRDC program alike. She is articulate and able to communicate complex ideas clearly. Carrie provides coaching to others on technical leadership skills and customer interface. She develops long-range objectives and strategic plans for OSM contract. 2010 Mgr Systems Engineering 2– Rating 4 FE OSM CE Carrie started the year (2010) as the Program Manager and duel role as the Chief Engineer. Carrie effectively transferred business duties to newly assigned PM and DPM. Carrie accomplished the transition with little disruption in productivity and delivered customer satisfaction. Carrie has excelled as the OSM Chief Engineer. This was evidenced by her leadership of two major Critical Design Reviews (CDRs) completed this summer with many government and contractor personnel in attendance representing the modeling community. The end result was the MDA/SNX customer expressing great satisfaction as the "nay-sayers" were disspelled and had very few comments to offer. Carrie diligently and successfully worked to earn the customers confidence and trust. 2011 System Eng 5 – Rating 3 EE As OMS Chief Engineer consistently exceeded SN customer expectations on product System engineering and on time delivery. Customer email on her departure: "Thanks for all you have done for the OSM team. The framework you put in place for development of the OSM models is exemplary and your technical leadership is very much appreciated. Good to know you will be working with the Warfighter where your skills will certainly help with the exercise analysis efforts. Best wishes to you.” Carrie provided information to OSM team to create a smooth departure. Her last task on OSM was to prepare the documentation for the OSM-S (SBX) 3.1 CDR on June 28 and 29, 2011. Comments from the MDA SN leadership including the Chief Engineer, Mr. Fred McKeen: The CDR was a success and the board members were pleased with the material presented. Members of the board were particularly pleased with the software engineering and planned testing/verification of the OSM code. Carrie received a timely award for her efforts in improving DCA&R (Data Collection Analysis and Reporting) products. She was a key contributor to the Analysis Six Sigma, Rapid Improvement Event, resulting in significant process improvements. Carrie stepped up, when past managers had not, to address a performance issue with a low performing employee. She worked within the NG process to document the issues and provided feedback to the employee. This effort became OBE when budget constraints lead to a RIF within the Analysis Team. Still her effort took courage and determination with the intent to obtain a productive team. 2012 System Eng 5 – Rating 4 FE As lead of an analysis team that was being downsized, Carrie was frank, direct and dealt with all members of the team equally. She held discussions as a group and individually to help them find new positions and deal with the changes. Carrie took on the role as Lead for the KMDS International IRAD effort, which involved significant coordination with teammates and other NG sectors. Carrie was able to complete the IRAD very successfully and she will continue to lead the project in 2013. Carrie has kept communication open between disparate groups working on the project through leading open discussions of architecture issues at telcons and TIMs. Carrie has facilitated the iterative process of allocating the system requirements to elements and refining them based on element analysis results. International BD is fraught with difficulties; Carrie jumped in with enthusiasm to understand NG export processes and OSD rules. Carrie is an outstanding engineer with strong technical and organizational skills. Name Employer Title Phone Email Charles H. Piersall, III, (*) MDA Deputy Associate Director M&S […] chuck.piersall@mda.mil Sarah Aust (*) MDA Assistant PM Knowledge Management DES/ESP […] sarah.aust@mda.mil Andrea Whalen (*) MDA /GMD […] Andrea.Whalen@mda.mil Company Training: Building 1NG for Leaders, International Business Acquisition Process, Security, OPSEC, Conferences 2004 MDA/AIAA 2nd Annual National Missile Defense Conference WDC 2004 AIAA Missile Sciences Conference Naval Postgraduate School 2005 NASIC Threat Missile Conference 2006 Authored and presented paper at 4th Annual National Missile Defense Conference WDC 2006 Abstract accepted for Missile Sciences Conference Naval Postgraduate School 2009 7th Annual National Missile Defense Conference WDC 2011 9th Annual National Missile Defense Conference WDC

Threat Integrator/Engineer

Start Date: 2006-11-01End Date: 2008-07-01

Threat Integrator/Engineer -TMC’s primary external interface and requirements definition engineer between the TMC and the BMDS community. Plans for requirement implementation identify scheduling requirements, conflicts and recommend COA. Represent the Organization Manager at forums requiring TMC threat representation. Algorithm development and review for Threat Generator (TG) core, process development for new routine integration into the TG structure. Performed specialized experiments, studies, and analysis. Received Certificate of Achievement for Algorithm development. Oct 2006 to Nov 2007 Aerospace engineer responsible for developing high fidelity ballistic missile and space launch models for use in a variety of modeling and simulation tools and the associated production of high fidelity scenarios. Research, interpret and apply parameters required to build models that replicate and propagate missile or space launch trajectories to include staging, debris, counter measures and RV / payload traits. NG grade SE4 MGR

• Exemplified adeptness in combining all-source data in producing and presenting clear and concise intelligence reports and studies for all levels of military organizations. • Conducted threat vulnerability assessments for international and/or domestic terrorist groups’ activities, threats, capabilities, and intentions. • Researched and analyzed various types of information to provide appropriate intelligence in the form of strategic and tactical assessments on ground forces doctrine; structure; organization; TTP; and the development of target packages on insurgent ground forces, bomb makers, and their associated networks in the Middle East Region. • Supervised all-source analyses and presented classified briefings of terrorist and/or insurgent group activities, threats, and vulnerabilities; including emergent and ongoing threats against U.S. and Coalition interests worldwide. • Efficiently responded to multiple Requests for Information (RFI) from Iraq-deployed units; and facilitated the integration of future intelligence-handling systems. • Incorporated SIGINT, HUMINT, and IMINT to ensure updates of all-source fusion target folders for the deployed military warfighter. • Created all-source target folders in collaboration with national intelligence agencies, service production centers, and Unified Command Joint Intelligence Centers (JIC) on intelligence assessments.

Intelligence Analyst LEONIE INDUSTRIES, COIC/JIEDDO

Start Date: 2010-08-01End Date: 2012-05-01

Identify and defeat IED networks in support of the warfighter. Work closely with the IMINT/GEOSPATIAL analysts • Utilized the RSA Archer database suite to pull threat reports and conduct queries for long term projects • Developed many different Visio charts to conduct brainstorming and flow analysis that were presentable to the leadership team • Utilized MS Project for the monthly newsletter about the latest and greatest IED threats and TTP • Worked as the lead analyst for all product development, security and threat analysis, and briefings, as well as forecasting the risks to personnel, assets and affliates. • Worked with the latest and greatest intelligence programs and link analysis tools to give timely intelligence reports and support to the leadership down to the warfighter • Conducted and completed 8 Request for support products that the COIC uses as their main tool to show a graphic depiction of the battles pace and network analysis of IEDs, Foreign Fighters, and Smuggling routes

Worked with high level agencies and commands throughout the DOD to combat the latest threats and risks to US systems, network integrity and systems infrastructure • Was the leader for 11 personnel in all areas such as intelligence analysis, training, operations, information assurance, and systems and security management • Conducted log analysis to include audit log and systems log and aided the auditors with the ISO compliance inspections • Performed weekly statistical analysis for reporting to the leadership and ensured the report/briefing was current and accurate • Aided the systems personnel to help establish a strong security architecture and conduct port and gap analysis. • Developed and established a training plan for USNORTHCOM TCCC, subjects for training were network security, identifying and fighting malicious logic, intelligence operations, and information assurance • Provide support within USNORTHCOM DWC in Intelligence, security, computer network defense/attack/exploitation, information assurance, and operations • Developed and presented over 1000 briefings to 0-6's and above in all CNO, satellite communications, and information assurance related incidents • Performed systems integration and vulnerability analysis/management across the Global Infrastructure Grid • Performed risk assessments and systems and security analysis to respond to all incidents within the GIG • Assisted in the computer forensics analysis on systems and servers after being exploited or corrupted • Conducted penetration tests in exercises and real world situations against all three levels of networks • Served as the go to analyst to conduct the serious incident reporting to leadership personnel and ensure the proper steps proceeded the briefing for best possible resolution • Conducted incident response operations with the other service organizations for best security practices were always being conducted and pursued • Identified security vulnerabilities and conducted risk assessments against new products proposed by the US Government agencies to be placed on their networks and any web applications deemed worthy • Reported IAVAs, IAVBs, and SARs, to leadership personnel and maintained them in the IAVM database as well as the inner office data base for statistical analysis Project Manager for Threat Data Management System/Network / Systems Administrator, Information Systems Security Officer (ISSO)

Developed a risk program for the organization and drove the risk train for Sally Beauty to aid in there way ahead and future operations in all areas of risk. Developed a step by step program for Sally Beauty per there status and maturity level. • Developed over 70 documents and products in the areas of Risk, RSA Archer, and Cloud computing to include policy documents, questionnaires, project plans, frameworks, and standard operating procedures. • Conducted the archer install and configuration for Sally Beauty as well as trained all relevant personnel in using the Risk, Enterprise, Compliance, and Policy modules inside of RSA Archer. • Trained 18 Sally Beauty personnel in the areas of Risk, RSA Archer and Cloud computing. • Presented over 20 executive level briefings in the areas of Risk RSA Archer and Cloud Computing.

All-Source Intelligence Analyst II

Timestamp: 2015-04-23

Highly motivated and well-seasoned HUMINT/CI Analyst with over thirteen years experience supporting U.S Forces in Korea, Iraq, Cuba, and other Middle East locations. Superior analytical and collection skills with extensive knowledge using multi-functional Intelligence programs across a wide spectrum of intelligence disciplines.

Watch Officer

Start Date: 2010-09-01End Date: 2011-07-01

•Received, coordinated, and disseminated classified and unclassified information and facilitated the exchange of law enforcement and national intelligence between ICE field offices, headquarters directorates and senior leadership. •Obtained and provided timely, accurate, and relevant information concerning events, actions, and threats in near real-time through event tracking, situation monitoring, and information management. •Responsible for making pertinent decisions during significant events, threats, and crises by seamlessly integrating operations, intelligence, and other information in support of senior leadership, security, maritime, contraband and illicit drugs, and emergency response within the homeland and abroad. •Researched, analyzed, developed and published intelligence products for mission requirements; accessing local and national intelligence information databases systems to respond to Request For Information (RFI).